Question: 1
.________________ (fill in the blank) is/are are ultimately accountable for the functionality, reliability, and security within IT governance. Choose the BEST answer.
Question: 2
.What can be used to help identify and investigate unauthorized transactions? Choose the BEST answer.
Question: 3
.Network environments often add to the complexity of program-to-program communication, making the implementation and maintenance of application systems more difficult. True or false?
Question: 4
.______________ risk analysis is not always possible because the IS auditor is attempting to calculate risk using nonquantifiable threats and potential losses. In this event, a ______________ risk assessment is more appropriate. Fill in the blanks.
Question: 5
.What must an IS auditor understand before performing an application audit? Choose the BEST answer.